Metrics
Affected Vendors & Products
No advisories yet.
Solution
To secure the Access Manager 92xx, it is highly recommended to update to the latest FW, at least XAMB 04.06.212 RA.
Workaround
No workaround given by the vendor.
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface. | |
| Title | Insufficient Session Management in dormakaba access manager | |
| Weaknesses | CWE-291 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-01-26T16:00:07.304Z
Reserved: 2025-09-09T07:53:12.879Z
Link: CVE-2025-59101
Updated: 2026-01-26T15:59:59.184Z
Status : Awaiting Analysis
Published: 2026-01-26T10:16:07.850
Modified: 2026-01-26T15:03:33.357
Link: CVE-2025-59101
No data.
OpenCVE Enrichment
No data.